![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2004-0193 |
Description: | Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username. |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2004-0193 BugTraq ID: 9752 http://www.securityfocus.com/bid/9752 Bugtraq: 20040227 EEYE: RealSecure/BlackICE Server Message Block (SMB) Processing Overflow (Google Search) http://marc.info/?l=bugtraq&m=107789851117176&w=2 CERT/CC vulnerability note: VU#150326 http://www.kb.cert.org/vuls/id/150326 eEye Security Advisory: AD20040226 http://www.eeye.com/html/Research/Advisories/AD20040226.html ISS Security Advisory: 20040226 Vulnerability in SMB Parsing in ISS Products http://xforce.iss.net/xforce/alerts/id/165 http://www.eeye.com/html/Research/Upcoming/20040213.html http://www.osvdb.org/4072 http://secunia.com/advisories/10988 XForce ISS Database: pam-smb-protocol-bo(15207) https://exchange.xforce.ibmcloud.com/vulnerabilities/15207 |